cvelist/2019/7xxx/CVE-2019-7390.json

67 lines
2.0 KiB
JSON
Raw Normal View History

2019-02-04 18:05:39 -05:00
{
2019-03-17 22:36:56 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-7390",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2019-02-04 19:06:15 -05:00
{
2019-03-17 22:36:56 +00:00
"lang": "eng",
"value": "An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to hijack the DNS service configuration of all clients in the WLAN, without authentication, via the SetWanSettings HNAP API."
2019-02-04 19:06:15 -05:00
}
2019-03-17 22:36:56 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/leonW7/D-Link/blob/master/Vul_5.md",
"refsource": "MISC",
"url": "https://github.com/leonW7/D-Link/blob/master/Vul_5.md"
},
{
"name": "106855",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106855"
}
]
}
}